Pass the ECCouncil EC-Council Certified Security Specialist ECSS Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Below is an extracted Apache error log entry.

"(Wed Aug 28 13:35:38.878945 2020] (core:error] (pid 12356:tid 8689896234] (client 10.0.0.8] File not found: /images/folder/pic.jpg"

Identify the element in the Apache error log entry above that represents the IP address from which the request was made.

Options:

A.

10.0.0.8


B.

8689896234


C.

13:35:38.878945


D.

12356


Expert Solution
Questions # 22:

Below are the various steps involved in an email crime investigation.

1.Acquiring the email data

2.Analyzing email headers

3.Examining email messages

4.Recovering deleted email messages

5.Seizing the computer and email accounts

6.Retrieving email headers

What is the correct sequence of steps involved in the investigation of an email crime?

Options:

A.

5->l->3->6-->2 >4


B.

2->4->3-->6->5-->l


C.

1—>3->4—>2-->5">6


D.

5 -> 1 -> 6 -> 2 -> 3 -> 4


Expert Solution
Questions # 23:

Christian is working as a software developer in a reputed MNC. He received a message from XIM bank that claims to be urgent and requests to call a phone number mentioned in the message. Worried by this, he called the number to check on his account, believing it to be an authentic XIM Bank customer service phone number. A recorded message asks him to provide his credit or debit card number, as well as his password.

Identify the type of social engineering attack being performed on Christian in the above scenario.

Options:

A.

SMiShing


B.

Spam mail


C.

Phishing


D.

Eavesdropping


Expert Solution
Questions # 24:

Bob, a security professional, was recruited by an organization to ensure that application services are being delivered as expected without any delay. To achieve this. Bob decided to maintain different backup servers for the same resources so that if one backup system fails, another will serve the purpose.

Identify the IA principle employed by Bob in the above scenario.

Options:

A.

Integrity


B.

Confidentiality


C.

Authentication


D.

Availability


Expert Solution
Questions # 25:

Martin, a hacker, aimed to crash a target system. For this purpose, he spoofed the source IP address with the target's IP address and sent many ICMP ECHO request packets to an IP broadcast network, causing all the hosts to respond to the received ICMP ECHO requests and ultimately crashing the target machine.

Identify the type of attack performed by Martin in the above scenario.

Options:

A.

UDP flood attack


B.

Multi vector attack


C.

Smurf attack


D.

Fragmentation attack


Expert Solution
Questions # 26:

A system that a cybercriminal was suspected to have used for performing an anti-social activity through the Tor browser. James reviewed the active network connections established using specific ports via Tor.

Which of the following port numbers does Tor use for establishing a connection via Tor nodes?

Options:

A.

1026/64666


B.

9150/9151


C.

3024/4092


D.

31/456


Expert Solution
Questions # 27:

Bob, a professional hacker, targeted an organization to launch attacks. Bob gathered information such as network topology and a list of live hosts. Based on the collected information, he launched further attacks over the organization's network.

Identify the type of network attack Bob initiated on the target organization in the above scenario.

Options:

A.

Session hijacking


B.

Buffer overflow


C.

Data modification


D.

Enumeration


Expert Solution
Questions # 28:

Daniel, a networking specialist, identifies a glitch in a networking tool and fixes it on a priority using a system.

Daniel was authorized to make a copy of computers programs while maintaining or repairing the system.

Which of the following acts was demonstrated in the above scenario?

Options:

A.

Data Protection Act 2018 (DPA)


B.

The Digital Millennium Copyright Act (DMCA)


C.

Sarbanes Oxley Act (SOX)


D.

Gramm Leach Bliley Act (GLBA)


Expert Solution
Questions # 29:

Jacob, a network defender in an organization, was instructed to improve the physical security measures to prevent unauthorized intrusion attempts. In this process, Jacob implemented certain physical security controls by using warning messages and signs that notify legal consequences to discourage hackers from making intrusion attempts.

Which of the following type of physical security controls has Jacob implemented in the above scenario?

Options:

A.

Detective control


B.

Preventive controls


C.

Deterrent controls


D.

Recovery controls


Expert Solution
Questions # 30:

Paola, a professional hacker, was hired to break into the target organization's network and extract sensitive data. In this process, Paola found that the target organization has purchased new hardware. She accessed the new hardware while it was in transit and tampered with the hardware to make it vulnerable to attacks.

Identify the class of attack Paola has performed on the target organization.

Options:

A.

Distribution attack


B.

insider attack


C.

Passive attack


D.

Active attack


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions